pull down to refresh

Best multisig UX, fully sovereign self-custody without third parties, non-trusted key generation verified by phone/laptop, superior multisig privacy and lower onchain fees, protection against nonce-based exfiltration attacks, simple T-of-N recovery with no descriptor footguns, fully open-source software.